SRM Performance, Upgrade, Security, Install
9 Blog Posts
5 Contributors
-
Cybersecurity automation and orchestration is an innovative approach to cybersecurity risk management that involves automating routine cybersecurity tasks and using orchestration to coordinate responses to cyber incidents. This approach can help... Read More »0Comments1Like
-
In the previous part1, part2, part3 and part4 we have seen on how to export the DB from AIX and to install ASCS and SCS and import DB on Linux. In this part we will see on how to install the primary and secondary application servers and post... Read More »0Comments2Likes
-
In the previous part1, part2 and part3 we have seen on how to export the DB from AIX and to install ASCS and SCS on Linux. In this part we will see on how to import the DB which we exported previously onto Linux. Assumptions: 1. Successfully... Read More »1Comment1Like
-
In the first and second blog of this Series we have seen on how to export the existing Oracle DB running on AIX. Now let’s move onto how to install ascs, scs. Assumptions: 1. Linux Admins created separate VMs piqascs00, piqscs00,... Read More »1Comment1Like
-
In the first blog of the series we have seen the export preparations and table splitting process. In this blog we will see how to export AIX DB. 1. Start again SWPM process –> Select Database Instance Export like shown below and click... Read More »0Comments1Like
-
In the Series of blogs we will see how customers can migrate from existing AIX OS to new Linux OS with SAP Migration process. There may be number of reasons why they want to upgrade OS but some of them are: 1. Current AIX licenses may be... Read More »2Comments8Likes
-
Why I write this tool When I am installing an SAP system from scratch. I use the SCP command to upload the downloaded files from SAP download centre to my SAP server. This tool is useful and great except that every time I need to type in the server... Read More »0Comments1Like
-
Vinita Kasliwal posted on September 2, 2018This Blog talks about the efforts you need to put in for the monitoring of the system to ensure the system is performing optimally. Although I am talking about SRM here specifically, it would be same across any on-premise system of SAP which you may... Read More »3Comments1Like
-
During the analysis of a customer incident, I tried to test the behavior of the function module BAPI_USER_GET_DETAIL where some information is restricted due to the maintenance of activity 05 (lock) in the authorization object S_USER_GRP. The... Read More »0Comments1Like